Cns Question Bank(Des&Obj)
Cns Question Bank(Des&Obj)
Question Bank
IV Year I Semester – 2024-25
CNS DESCRIPTIVE QUESTION BANK
5M 1 2 2
2 c) What is steganography? What are the similarities
and differences between steganography and
cryptography? What are the relative advantages and
disadvantages of steganography?
UNIT-III
a) Draw the diagram for Symmetric key encryption 2M 1 1,2 3
with confidentiality and authentication
1
b) Explain Authentication Requirements? 3M 1 1 2
c) Explain SHA-512 Algorithm in detail 10M 1 1 2
a) Define MAC and how it differs from 2M 1 1,2 1
encryption.
b) What are authentication functions and define 3M 1 1,2 1
2
them briefly.
c) Explain Message Authentication Code (MAC)
and Hash function in detail with neat figures. 10M 1 1,2 2
12. The process of writing the text as diagonals and reading it as a sequence of rows is
known as__________________
13. ------------is a technique that facilitates hiding of a message that is to be kept secret inside
other messages
16.--------- attack take place when one entity pretends to different entity
17.-----------ensures that only authorized parties are able to modify computer system data
and transmitted information
18. A process which is designed to detect, prevent or recover from an attack is known as
------
UNIT II
Multiple Choice Questions
(a) 128 bits (b) 164 bits (c) 64 bits (d) 156 bits
8.Each S-box takes 6 bits input and produces ---- bits as output.
11. In general private key encryption algorithms uses ----- no. of keys.
12. Public key encryption algorithm uses ---- no. of keys .
13. RSA algorithm was developed by---------
14. IDEA stands for---------
15. CBC stands for --------------
16. DES encrypts blocks of ---------- bits
17. AES requires ------------- no of bits for plain text
18. No of S- boxes used in Blowfish algorithm is -----------
19. There are ----------rounds in Blowfish
20. In -------------one block of plain text is encrypted at a time
UNIT III
Multiple Choice Questions
1. Kerberos is ----------service designed for use in a distributed environment
a) integrity b) confidentiality c) authentication d) availability
2. -------- is a message digest algorithm
a) DES b) IDEA c) MD5 d) RSA
3. When a hash function is used to provide message authentication, the hash function
value is reffered to as ----
a) message digest b) message field c) message score d) message leap
4. X.509 scheme is -----certificate
a) Private key b) public key c) symmetric key d) none
5. MAC is also called-----
a) Cryptographic checksum b) fingerprint c) message digest d) all the above
6. Hash function can be applied to a block of ----
a) fixed size b) variable size c) 512 bytes d) 1024 byte
7. SHA -512 uses -----registers
a) 8 b) 6 c) 4 d)5
8. SHA follows --- format to store values
a) little enidian b) big enidian c) both a & b d) none
9. Number of steps in SHA-512-------
a) 60 b) 70 c) 80 d) 40
10. Kerberos makes use of ------ algorithm
a) RSA b)DES c) Blowfish d) IDEA
Fill In The Blanks
11. SHA represents--------------
12. Each block size of SHA -512 is ------------
13. SHA -512 algorithm outputs -----------bit message digest
14. TGS stands for-------------------
15. A ------------- can issue digital certificates
16. The ------------standard defines the structure of a digital certificate
17. A full service Kerberos environment is called as-----------
18. HMAC stands for---------------
19. There are -------number of versions in x.509
20. Version 4 of Kerberos uses --------------encryption mode
UNIT IV
Multiple Choice Questions
UNIT-V